1. Shannon, C. E. (1948). The mathematical theory of communication. The Bell System Technical Journal, 27, 379–423.
2. Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28, 656–715.
3. Menezes, A., van Oorschot, P., & Vanstone, S. (1996). Applied cryptography. Boca Raton: CRC.
4. Ding, W., Yan, W.-Q., & Qi, D.-X. (2000). A novel digital hiding technology based on Tangram Encryption. IEEE Proceedings of on NEWCAS 2005, and Conways Game. Proceeding of 2000 International Conference on Image Processing (Vol. 1, pp. 601–604), September 2000.
5. Zhao, X.-F. (2003). Digital image scrambling based on the Baker’s transformation. Journal of Northwest Normal University (Natural Science), 39(2), 26–29.